US7554967B1 - Transient tunneling for dynamic home addressing on mobile hosts - Google Patents
Transient tunneling for dynamic home addressing on mobile hosts Download PDFInfo
- Publication number
- US7554967B1 US7554967B1 US09/662,531 US66253100A US7554967B1 US 7554967 B1 US7554967 B1 US 7554967B1 US 66253100 A US66253100 A US 66253100A US 7554967 B1 US7554967 B1 US 7554967B1
- Authority
- US
- United States
- Prior art keywords
- home
- mobile
- host
- mobile host
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/04—Registration at HLR or HSS [Home Subscriber Server]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
Definitions
- the present invention relates generally to portable and/or mobile communications, and more particularly, to a method for enabling a portable and/or mobile host, using the Mobile Internet Protocol (M-IP) to dynamically acquire a home address in a manner consistent with the Dynamic Host Configuration Protocol (DHCP) when powering up in a foreign network.
- M-IP Mobile Internet Protocol
- DHCP Dynamic Host Configuration Protocol
- a host device which may be a laptop computer, a personal digital assistant (PDA), a digital cellular telephone, or any other device adapted to perform two-way communication of information using the now well known Internet Protocol (IP), is considered to be “portable” when the device can be moved from one location to another, and operate at either location.
- a portable device does not have to operate WHILE it is being moved.
- a device is considered to be “mobile” when it can not only operate in different locations, but it can also operate WHILE it is being moved from location to location. If a device is adapted for mobile operation, it is, by definition, portable. Accordingly, in the following description, the use of the term “mobile host” will include both situations where the host is mobile (being moved) as well as where the host is in an area served by a foreign network.
- DHCP Dynamic Host Configuration Protocol
- R. Droms Dynamic Host Configuration Protocol
- RFC2131 Draft Standard March 1997.
- DHCP not only enables hosts to acquire addresses but also other configuration options associated with the access network (e.g., netmask for subnet, domain name servers, directory servers, email servers, etc.)
- S. Alexander and R. Droms DHCP Options and BOOTP vendor Extensions , RFC2132 Draft Standard, March 1997.
- the DHCP protocol is a popular tool for today's service providers to manage their addressing needs.
- DHCP While DHCP was originally intended for use with fixed hosts, it was a natural candidate to support dynamic addressing in the context of a host that would be portable and/or mobile. Since DHCP was designed for fixed hosts, its use on mobile hosts presented a number of challenges. Many of DHCP's limitations in supporting host mobility have been well documented in the literature, although none of such efforts have focused on dynamic home addressing which is the target of this invention. See, for example, Charles Perkins and Kevin Luo, Using DHCP with Computers that Move , Wireless Networks Journal, vol. 1, pp.
- M-IP Mobile IP protocol
- the prime goal of M-IP is to enable mobile hosts to get connected to the Internet and remain connected WHILE they move. This connectivity is preserved in a “transparent” manner, that is, in such a way that it prevents the disruption of networked applications running on the mobile host while it moves.
- M-IP relies on the ability to configure the device's IP address to match that of the subnet onto which it is attached at any point in time, since having the correct address is needed to ensure that packets get routed to the host.
- M-IP a mobile host has a fixed home address and acquires an additional care-of address (COA) that is updated as the host changes its location, called a “point of attachment”.
- COA additional care-of address
- M-IP allows two options regarding the placement of a COA agent, also called the Foreign Agent (FA); the agent may be present inside the network (for example, at the base station) or as a co-located care-of address (CCOA) at the mobile host. While M-IP relies on the ability to configure the home and care-of addresses, it does not dictate how they are to be obtained.
- FA Foreign Agent
- CCOA co-located care-of address
- Dynamic home addressing enables efficient management of addresses, which is critical in supporting wide-area wireless data users with millions of devices using the limited address space dictated by the IPv4 standard. It also provides ease of configurability, by replacing the burdensome task of manually configuring hosts with a more effective mechanism for address allocation. Note that the IPv6 standard removes address space limitations but it also stands to benefit from the configurability advantages awarded by dynamic addressing support.
- the present invention is a method called Transient Tunneling (TT) that allows configuring of portable and/or mobile IP hosts desiring to connect to the Internet, whereby such hosts can dynamically acquire a home address through DHCP when powering up in a foreign network.
- the method comprises a two-stage configuration procedure: First, the mobile host uses the M-IP protocol to establish contact with an addressing element, referred to as a bootstrapping agent, that is usually co-located with a M-IP Home Agent, and that allocates a temporary home address for the mobile host that is used to create a temporary tunnel; second, this temporary tunnel is used as the communication vehicle over which standard DHCP transactions take place.
- TT Transient Tunneling
- the present invention is thus arranged to use a) M-IP as the signaling mechanism for reaching the home network and triggering the acquisition of a temporary home address for the mobile host; and b) DHCP to allocate a permanent home address and any other configuration state for the mobile host.
- the method of the present invention advantageously enables the use of conventional broadcasting procedures to properly discover an addressing server in their home network, and does not require changes to protocol standards. Only minor changes must be made to server implementations.
- the invention is simple to implement, avoids the problems that plague its alternatives, and exhibits acceptable performance.
- it leverages the growing DHCP code-base, with respect to its embedded support for important and often necessary host configuration options beyond addressing. While being DHCP-based, the method is potentially useful to any dynamic home addressing protocol that relies on broadcasting for server discovery.
- FIG. 1 is a block diagram illustrating the typical arrangement of home and foreign networks, showing the cooperation between a home agent (HA) 101 and a bootstrapping agent arranged in accordance with the present invention
- FIG. 2 is a diagram illustrating the standard DHCP messages that are exchanged for a mobile host to acquire a home address when it powers up in its home network and has no knowledge of an unexpired home address lease;
- FIG. 3 is a diagram illustrating the messages that are exchanged when a mobile host powers up in a foreign network, in accordance with the arrangement of the present invention
- FIG. 4 is a flow diagram illustrating the registration process performed in a M-IP HA when arranged in accordance with the present invention to include a bootstrapping agent;
- FIG. 5 is a flow diagram illustrating the de-registration process performed in a M-IP HA arranged in accordance with the present invention to include a bootstrapping agent.
- FIG. 1 is a high level block diagram showing the typical arrangement of home and foreign networks.
- a home agent (HA) 101 and a foreign agent (FA) 103 there are two mobility agents: a home agent (HA) 101 and a foreign agent (FA) 103 .
- Home agent 101 gives mobility support to hosts (such as mobile host 110 ) that belong to the same home network 102
- FA 103 serves hosts that are visiting from a foreign (remote home) network 104 .
- Each mobile host must have a home address and must also acquire a care-of address (COA) when attached to a foreign network.
- COA care-of address
- the manner in which the COA is assigned depends on whether the FA resides on the host, i.e., the co-located or CCOA option, or on a device in the local access network. When an external FA is used, the COA becomes the address of one of its network interfaces.
- the host acquires a CCOA through static means or preferably through a dynamic addressing protocol like DHCP.
- the mobile host engages in two-way communication with a remote party, that shown in FIG. 1 as a corresponding host 130 .
- a remote party that shown in FIG. 1 as a corresponding host 130 .
- COA network-based
- CCOA host based
- Packets sent to the mobile host 110 from a remote sender such as corresponding host 130 are always addressed to its home address. While the host is attached to its home network 101 , packets reach it following conventional routing via the Internet 120 . When the host moves into a foreign network 104 , it acquires a COA and registers it with its home agent 101 . Once registered, packets destined to its home address are routed as normal packets until they reach the home network 102 , where the home agent 101 intercepts them. The home agent 101 encapsulates these packets to address them to the host's COA. Encapsulated packets are then routed as usual until they reach the host's foreign agent 103 .
- tunneled packets transmitted through Internet 120 via a path that is often described as a tunnel (labeled 122 in FIG. 1 )—are decapsulated (i.e., the COA is removed) by the foreign agent 103 , and the original packet is forwarded to the mobile host 110 .
- IP tunneling For details on “IP tunneling”, see “IP Encapsulation within IP”, Charles Perkins, RFC 2003 Draft Standard, October 1996.
- packets sent from the host 110 to corresponding host 130 may optionally be reverse-tunneled, that is, encapsulated by the FA 103 and sent back to the home agent 101 , which decapsulates and forwards them to the remote party.
- the host 110 Each time the host 110 moves between points of attachment crossing a network or subnet boundary, it acquires a new care-of address and re-registers it with its home agent.
- Home agents associate a lifetime to the state they install for a host, requiring periodic lifetime renewals to avoid state expiration and removal.
- DHCP has a client-server architecture, in which a DHCP server 150 in FIG. 1 is accessible to a client on a mobile host via intranet 160 , when the mobile host powers up in home network 102 .
- a server manages a portion of the IP address space on a network by disbursing addresses and other configuration parameters to clients, such as name server addresses, on a request basis.
- a client running on a host allows it to dynamically acquire configuration state, replacing conventional static methods requiring manual intervention. If there are no servers on the same subnet to which the host is connected, a relay is introduced for forwarding client requests to servers on other subnets.
- Configuration parameters acquired by a client are leased, i.e., they have an associated expiration time, requiring periodic lease renewals to prevent lease expiration and configuration state removal.
- Client-server communication takes place in the following manner. Packets destined to the server are always sent as IP broadcasts when the client does not know the address of a server. Otherwise, it may unicast its requests to the server's IP address (e.g., during a lease renewal). Packets destined to the client are usually sent as IP broadcasts, with two exceptions. First, if the client's request was forwarded from a relay, the server unicasts its response to the relay's IP address. The relay, in turn, broadcasts the packet on its subnet in order to reach the client.
- the server unicasts its replies to the client's hardware address, with the offered IP address in the destination field of the IP header.
- a mobile host relies on DHCP to dynamically configure both its home address and its co-located COA. This implies that clients running on the host must acquire and maintain leases on both addresses. Let us refer to the clients for the home address and for the CCOA as Hclient and Fclient, respectively.
- FIG. 2 is a diagram that illustrates the standard addressing messages that are exchanged.
- Hclient attempts to contact a server by broadcasting a DISCOVER message (illustrated as rightward arrow 201 in FIG. 2 that originates from the mobile host) on its local subnet. This is actually a limited broadcast message since it is destined to address 255.255.255.255. The message is received by a server, or a relay on that subnet that is configured to forward the message (illustrated as rightward arrow 202 in FIG.
- the message 202 reaches the server, it responds with an OFFER message (illustrated as leftward arrows 203 and 204 in FIG. 2 ) that it either broadcasts on its subnet or unicasts to the relay that had forwarded it.
- the mobile host receives the message 203 , 204 as a limited broadcast.
- Hclient then broadcasts a REQUEST message (illustrated as rightward arrows 205 and 206 in FIG. 2 ), reaching the server directly or via the relay, as before.
- the server responds with an ACK message (illustrated as leftward arrows 207 and 208 in FIG. 2 ), confirming the granting of a lease.
- the ACK message 207 , 208 reaches the host once again as a limited broadcast and Hclient concludes its lease acquisition by installing acquired state on the host's interface. Though not shown in FIG. 2 , Hclient periodically enters the lease maintenance stage where it sends renewals to its home server. As per the M-IP standard, no M-IP registrations are needed while the host is in its home network.
- the present invention uses the notion of an addressing agent, shown in FIG. 1 as a bootstrapping agent 140 , for temporary home address allocation coupled with the assistance of M-IP.
- the present invention is arranged to use a) M-IP as the signaling mechanism for reaching the home network and triggering the acquisition of a temporary home address; b) a bootstrapping agent 140 cooperating with HA 101 in the home network to allocate a temporary home address for the host; and c) DHCP to allocate a permanent home address and any other configuration state for the host.
- M-IP the signaling mechanism for reaching the home network and triggering the acquisition of a temporary home address
- a bootstrapping agent 140 cooperating with HA 101 in the home network to allocate a temporary home address for the host
- DHCP to allocate a permanent home address and any other configuration state for the host.
- the host On power-up, the host must first determine whether it is in its home or in a foreign network. This location determination may be based on knowledge of its NAI, such as a user email address 1 . For example, a M-IP client on the host may listen for periodic advertisements from a home or foreign agent containing the domain name which it can then compare against its own NAI. If the host is in its home network, the process described above in connection with FIG. 2 is used. If the host is in a foreign network, the present invention is invoked, using the message flows illustrated in FIG. 3 . 1 A wireless link layer identifier such as the Mobile Identification Number (MIN) can be mapped to a NAI[10].
- MIN Mobile Identification Number
- the host first needs to acquire a co-located COA, so it spawns a DHCP client (Fclient).
- a DISCOVER message (illustrated as rightward arrows 301 and 302 in FIG. 3 ) is sent from the mobile host (MH in FIG. 3 ) to the foreign DHCP server, via a foreign DHCP relay.
- an acknowledgement (ACK) message (illustrated as leftward arrows 303 and 304 in FIG. 3 ) is returned.
- ACK acknowledgement
- the mobile host acquires the COA, it sends a unicast M-IP registration message (illustrated as rightward arrow 305 in FIG. 3 ) to its HA.
- bootstrapping agent 140 When the HA receives the registration message and notices that the home address is missing, it contacts bootstrapping agent 140 in FIG. 1 to acquire a temporary home address on behalf of the host.
- bootstrapping agent 140 which can be thought of as a “lightweight addressing agent”, is placed on the M-IP HA. However, it is to be noted here that bootstrapping agent 140 can also be located remotely from HA 101 . In either event, bootstrapping agent 140 disburses temporary home addresses to the mobile host.
- This address pool may contain public, globally routable IP addresses or private IP addresses in the class 10.*. Drawing from a pool of private addresses is usually preferable when public addresses are scarce and must be used sparingly.
- the addressing pool consists of private addresses, although the transient tunneling procedure applies to either case.
- the HA uses it to set up a tunnel to the COA of the host.
- the HA unicasts a registration reply message (illustrated as leftward arrow 306 in FIG. 3 ) containing the 10.* address back to the host.
- the host sets up its end of the tunnel.
- Hclient is initialized on the host and launches a standard set of transactions needed to acquire a home address and other configuration options through the transient tunnel (highlighted with bold arrows in FIG. 3 ). All Hclient messages must be reverse tunneled through the HA to ensure that they are not received by any local DHCP servers or relays.
- Reverse tunneled messages are forwarded on the home subnet by the receiving HA, so that a home server or relay receives them. Similarly, replies sent by a home server or relay are tunneled to the remote host. Using this transient tunnel, Hclient can acquire an address (and other requested configuration state) from a home server without concerns about broadcasting.
- the message flow in FIG. 3 in which the home address is acquired includes transmission of a DHCP request message 307 from Hclient to the HA 101 in FIG. 1 , using tunneling; the extra address is stripped off at the HA, and the DHCP request message 307 a is transmitted from the HA to the home DHCP server 150 in FIG. 1 via intranet 160 .
- the address information is sent from the DHCP server to the HA in message 308 a ; at the HA, the extra address is added, and the message 308 , including the desired address information, is transmitted to Hclient on mobile host 110 in FIG. 1 using tunnel 122 in FIG. 1 .
- the 10.* address should be released 3 , and its associated tunnel torn down and replaced with a tunnel terminating at the DHCP-granted permanent home address. This is accomplished by sending a M-IP de-registration message 309 from the host to the HA. An M-IP reply message 310 is then returned to the mobile host. Note that the Mobile IP tunnel associated with the 10.* address can also be allowed to time-out, instead of requiring the mobile host to send an explicit de-registration message ( 309 ) and wait for a reply ( 310 ). 3 Alternatively, the 10.* address could have a short lease (in the order of 10 seconds) and be allowed to time-out.
- a registration containing address can occur. This involves sending a message 311 with a permanent home address from the M-IP client to the HA, and receipt of an M-IP reply message 312 in return. Note that lease renewals may also be broadcast, since they are reverse-tunneled to the home network.
- the broadcast bit options in DHCP and M-IP must be set.
- the broadcast “B” bit in the flags field of DHCP query messages must be set by the clients to ensure that the replies from the server or relay in the home network reach the client on the host while it is in the foreign network.
- Existing implementations of DHCP clients such as on Microsoft Windows and ISC's implementation for UNIX always set the broadcast bit by default.
- the client informs the server or relay to send any replies to the host as a broadcast using an IP broadcast address as the IP destination address and the link-layer broadcast address as the link-layer destination address. This ensures that the HA receives broadcast packets for subsequent forwarding to the host.
- the M-IP broadcast “B” bit in registration requests must also be set to ensure that the HA tunnels broadcast messages back to the host.
- a drawback in setting this bit is that the host may receive a flood of unwanted broadcast messages from its home network that are forwarded by its HA. This would result in a significant waste of wireless bandwidth. Strategies to address this issue are discussed below.
- transient tunneling uses a bootstrapping addressing agent on the home agent to allocate private home addresses. This enables a temporary tunnel to be established to the host over which a standard, co-located DHCP client can acquire a lease from a pool of public (i.e., globally routable) home addresses. Once a home address is acquired, it is used to replace the temporary tunnel with a corresponding M-IP tunnel.
- a bootstrapping addressing agent on the home agent to allocate private home addresses.
- FIG. 4 A flow diagram illustrating the registration process performed in HA 101 of FIG. 1 arranged in accordance with the present invention to work cooperatively with a bootstrapping agent 140 , is shown in FIG. 4 .
- the process is initiated in step 401 , when a registration message (message 305 of FIG. 3 ) is received at HA 101 ( FIG. 1 ) from MH 110 ( FIG. 1 ).
- a determination is made in step 403 as to whether the registration message specifies a home address. This might occur, for example, if the mobile host 110 had already been provided with a static home address. If so, a YES result occurs, and the process proceeds to step 405 , in which a standard registration procedure is performed.
- step 403 the process continues to step 407 to determine if the registration request includes a network access indicator (NAI). If not, a NO result occurs, and the process terminates in step 406 , in which a error code is returned to MH 110 using the M-IP protocol. If an NAI is present, authentication procedures are initiated in step 409 , and the process determines, in step 411 , if authentication was successful for the NAI determined to be present in step 407 . If not, a YES result occurs in step 411 , and the process again proceeds to step 406 . If authentication occurs, bootstrapping agent 140 ( FIG. 1 ) is used, in step 413 , to temporarily allocate a 10.* address to MH 110 .
- NAI network access indicator
- step 415 A determination of the success of the allocation process is made in step 415 . If the process fails (for any possible reason), a YES result occurs in step 415 , and the process terminates with step 406 . Otherwise, a NO result occurs in step 415 , and a tunneling entry (using the 10.* address as a COA) is then set up at HA 101 in step 417 . The registration process is complete when HA 101 returns a registration reply (message 306 of FIG. 3 ) to MH 110 using the COA, and including the 10.* address.
- FIG. 5 A flow diagram illustrating the de-registration process performed in HA 101 ( FIG. 1 ) together with bootstrapping agent 140 ( FIG. 1 ) is shown in FIG. 5 .
- the process is initiated in step 501 , when a de-registration message (message 309 of FIG. 3 ) is received from MH 110 in HA 101 .
- This message triggers an authentication procedure in step 503 . If it is determined in step 505 that the authentication failed, a YES result occurs, and a error code message is sent to the MH using the M-IP protocol. If the authentication is successful, the process continues to step 509 , in which a determination is made as to whether the de-registration relates to an address in the 10.* format.
- step 509 If not, a NO result occurs in step 509 , and the conventional or standard de-registration procedure is performed in step 511 .
- the tunnel previously established in step 417 of FIG. 4 is torn down in step 513 , and in step 515 bootstrapping agent 140 releases for re-use the 10.* address allocated in step 413 of FIG. 4 .
- a reply (message 310 in FIG. 3 ) is sent from HA 101 ( FIG. 1 ) to MH 110 in step 517 , indicating that the de-registration process has been completed.
- the present invention can be modified, if desired, to make more efficient use of wireless bandwidth.
- This modification is practical and useful, since mobile hosts usually connect to an IP access network through a wireless air link, where bandwidth tends to be limited and costly due to physical and regulatory constraints.
- practical mobility solutions should be concerned with the effective use of air bandwidth.
- Typical approaches to address this concern are packet compression techniques and the reduction of over-the-air traffic. We focus on the latter approach.
- Traffic over-the-air may be reduced through the prevention of bandwidth waste.
- One way to prevent bandwidth waste in the transient tunneling process of the present invention is to stop unwanted broadcast packets originating in the home network from being tunneled to the mobile host by its HA. Recall from previous description that a broadcasting bit needs to be set in the HA so that DHCP packets broadcast by a server or relay in the home network reach the host in a foreign network. Unfortunately, all broadcast packets will be forwarded when the transient tunnel is present, not just the few desired DHCP packets. This introduces a costly traffic burden, especially over low bit-rate wireless links. We now describe an approach to eliminate this undesirable broadcast traffic overhead.
- the DHCP client is modified to mimic the operation of a joint client and relay.
- the server is tricked into responding with IP unicast messages, thus eliminating the need for the HA to forward any broadcast packets downstream.
- the co-located relay i.e., the relay at the mobile host
- the co-located relay is arranged to use the private (temporary) home address of the host acquired through transient tunneling process of FIG. 4 as its IP address, and advertise it to the home DHCP server in the ‘giaddr’ field of messages 307 and 307 a of FIG. 3 .
- address assignment rules used by the DHCP server to decide which address to assign to an incoming request are not standardized. Server implementations often select an address on the subnet where the relay resides, if the request was relayed, or on the subnet associated with the server's interface on which the request was received. This may result in an undesirable address assignment for transient tunneling, entailing possible implementation-dependent changes to the server's subnet selection rules.
- the DHCP server receives the DHCP request (message 307 a of FIG. 3 ), and notices that the ‘giaddr’ field is populated, it responds with a unicast message (message 308 a in FIG.
- the description of the transient tunneling process assumed that the FA is co-located with the mobile host. However, in some instances, it is necessary or desirable to use an external foreign agent. If this is done, the transient tunneling process shown in FIG. 3 is slightly different.
- the mobile host acquires a COA from an external foreign agent, rather than from a DHCP server as shown in messages 301 through 304 .
- the mobile IP registration message is sent by the client on the mobile host to the external foreign agent (not directly to the home agent, as shown by message 305 in FIG. 3 ). The external foreign agent forwards the registration message to the HA.
- the HA replies to the external foreign agent with the 10.* home address, which is used by the external foreign agent to set up its end of the transient tunnel.
- the transient tunnel extends between the external foreign agent (not the mobile host) and the HA. After the transient tunnel is set up, the foreign agent forwards the registration reply message to the client on the mobile host.
- the de-registration process shown in FIG. 3 is also slightly different, in a manner similar to that just described.
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (11)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/662,531 US7554967B1 (en) | 2000-03-30 | 2000-09-15 | Transient tunneling for dynamic home addressing on mobile hosts |
CA002337704A CA2337704C (en) | 2000-03-30 | 2001-02-22 | Transient tunneling for dynamic home addressing on mobile hosts |
DE60125266T DE60125266T2 (en) | 2000-03-30 | 2001-03-19 | Continuous tunneling for dynamic local addressing of mobile computers |
EP01302467A EP1139634B1 (en) | 2000-03-30 | 2001-03-19 | Transcient tunneling for dynamic home addressing on mobile hosts |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US19334000P | 2000-03-30 | 2000-03-30 | |
US09/662,531 US7554967B1 (en) | 2000-03-30 | 2000-09-15 | Transient tunneling for dynamic home addressing on mobile hosts |
Publications (1)
Publication Number | Publication Date |
---|---|
US7554967B1 true US7554967B1 (en) | 2009-06-30 |
Family
ID=40793560
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/662,531 Expired - Lifetime US7554967B1 (en) | 2000-03-30 | 2000-09-15 | Transient tunneling for dynamic home addressing on mobile hosts |
Country Status (1)
Country | Link |
---|---|
US (1) | US7554967B1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050021766A1 (en) * | 2001-03-26 | 2005-01-27 | Mckeowen Jean Christophe | Broadband communications |
US20060002407A1 (en) * | 2004-07-01 | 2006-01-05 | Fujitsu Limited | Network system, network bridge device, network management apparatus, network address assignment method and network address resolution method |
US20070011045A1 (en) * | 2005-07-07 | 2007-01-11 | Munch Marketing Inc. | Method for advertising |
US20080159230A1 (en) * | 2007-01-03 | 2008-07-03 | Jae-Hun Cho | Bridge-based cellular ethernet system and handover processing method therefor |
US20080310375A1 (en) * | 2004-09-20 | 2008-12-18 | Matsushita Electric Industrial Co., Ltd. | Return Routability Optimisation |
US20100124228A1 (en) * | 2008-11-17 | 2010-05-20 | Qualcomm Incorporated | Remote access to local network |
US20100125899A1 (en) * | 2008-11-17 | 2010-05-20 | Qualcomm Incorporated | Remote access to local network via security gateway |
US20100180014A1 (en) * | 2009-01-14 | 2010-07-15 | International Business Machines Corporation | Providing network identity for virtual machines |
US20100250787A1 (en) * | 2009-03-26 | 2010-09-30 | Brother Kogyo Kabushiki Kaisha | Information processing device, information processing system provided with the same, and computer readable medium for the same |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998043446A2 (en) | 1997-03-25 | 1998-10-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Communicating packet data with a mobile station roaming within an incompatible mobile network |
US6275693B1 (en) * | 1999-11-22 | 2001-08-14 | Motorola, Inc. | Method and apparatus for performing bearer independent wireless application service provisioning |
US20010046223A1 (en) * | 2000-03-08 | 2001-11-29 | Malki Karim El | Hierarchical mobility management for wireless networks |
US6407988B1 (en) * | 1998-10-06 | 2002-06-18 | At&T Corp. | Mobility support services using mobility aware access networks |
US6421714B1 (en) * | 1997-10-14 | 2002-07-16 | Lucent Technologies | Efficient mobility management scheme for a wireless internet access system |
US20020143990A1 (en) * | 1997-12-18 | 2002-10-03 | Matti Turunen | Mobile internet protocol for mobility of access hosts between networks |
US6510153B1 (en) * | 1998-02-20 | 2003-01-21 | Kabushiki Kaisha Toshiba | Mobile IP communication scheme using dynamic address allocation protocol |
US6535493B1 (en) * | 1998-01-15 | 2003-03-18 | Symbol Technologies, Inc. | Mobile internet communication protocol |
US6567664B1 (en) * | 1999-06-02 | 2003-05-20 | Nokia Corporation | Registration for mobile nodes in wireless internet protocols |
US6587882B1 (en) * | 1997-08-01 | 2003-07-01 | Kabushiki Kaisha Toshiba | Mobile IP communication scheme using visited site or nearby network as temporal home network |
US6636491B1 (en) * | 1998-01-14 | 2003-10-21 | Nokia Corporation | Access control method for a mobile communications system |
US6651105B1 (en) * | 1998-11-12 | 2003-11-18 | International Business Machines Corporation | Method for seamless networking support for mobile devices using serial communications |
US6654607B1 (en) * | 2000-02-14 | 2003-11-25 | Toshiba America Research, Inc. | Method and apparatus for enabling and monitoring mobile communication across platforms |
US6707809B1 (en) * | 1999-02-25 | 2004-03-16 | Utstarcom, Inc. | Method for forwarding data to idle mobile nodes, and home agent control node for use in the method |
US6738362B1 (en) * | 1999-02-25 | 2004-05-18 | Utstarcom, Inc. | Mobile internet protocol (IP) networking with home agent and/or foreign agent functions distributed among multiple devices |
US6928282B2 (en) * | 2001-08-29 | 2005-08-09 | Fujitsu Limited | Mobile IP network system |
-
2000
- 2000-09-15 US US09/662,531 patent/US7554967B1/en not_active Expired - Lifetime
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998043446A2 (en) | 1997-03-25 | 1998-10-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Communicating packet data with a mobile station roaming within an incompatible mobile network |
US6587882B1 (en) * | 1997-08-01 | 2003-07-01 | Kabushiki Kaisha Toshiba | Mobile IP communication scheme using visited site or nearby network as temporal home network |
US6421714B1 (en) * | 1997-10-14 | 2002-07-16 | Lucent Technologies | Efficient mobility management scheme for a wireless internet access system |
US6484211B2 (en) * | 1997-12-18 | 2002-11-19 | Nokia Mobile Phones Ltd. | Mobile internet protocol for mobility of access hosts between networks |
US20020143990A1 (en) * | 1997-12-18 | 2002-10-03 | Matti Turunen | Mobile internet protocol for mobility of access hosts between networks |
US6636491B1 (en) * | 1998-01-14 | 2003-10-21 | Nokia Corporation | Access control method for a mobile communications system |
US6535493B1 (en) * | 1998-01-15 | 2003-03-18 | Symbol Technologies, Inc. | Mobile internet communication protocol |
US6510153B1 (en) * | 1998-02-20 | 2003-01-21 | Kabushiki Kaisha Toshiba | Mobile IP communication scheme using dynamic address allocation protocol |
US6407988B1 (en) * | 1998-10-06 | 2002-06-18 | At&T Corp. | Mobility support services using mobility aware access networks |
US6651105B1 (en) * | 1998-11-12 | 2003-11-18 | International Business Machines Corporation | Method for seamless networking support for mobile devices using serial communications |
US6707809B1 (en) * | 1999-02-25 | 2004-03-16 | Utstarcom, Inc. | Method for forwarding data to idle mobile nodes, and home agent control node for use in the method |
US6738362B1 (en) * | 1999-02-25 | 2004-05-18 | Utstarcom, Inc. | Mobile internet protocol (IP) networking with home agent and/or foreign agent functions distributed among multiple devices |
US6567664B1 (en) * | 1999-06-02 | 2003-05-20 | Nokia Corporation | Registration for mobile nodes in wireless internet protocols |
US6275693B1 (en) * | 1999-11-22 | 2001-08-14 | Motorola, Inc. | Method and apparatus for performing bearer independent wireless application service provisioning |
US6654607B1 (en) * | 2000-02-14 | 2003-11-25 | Toshiba America Research, Inc. | Method and apparatus for enabling and monitoring mobile communication across platforms |
US20010046223A1 (en) * | 2000-03-08 | 2001-11-29 | Malki Karim El | Hierarchical mobility management for wireless networks |
US6928282B2 (en) * | 2001-08-29 | 2005-08-09 | Fujitsu Limited | Mobile IP network system |
Non-Patent Citations (9)
Title |
---|
Alexander, S. et al., "DHCP Options and BOOTP vendor Extensions", RFC2132 Draft Standard, Mar. 1997. |
Droms, R., Dynamic Host Configuration Protocol, RFC2131 Draft Standard, Mar. 1997. |
McAuley, A. et al., "Dynamic Registration and Configuration Protocol (DRCP)", http://search.ietf.org/internet-drafts/draft-itsumo-drcp-00.txt, Oct. 1999. |
Perkins, C., "IP Encapsulation within IP", RFC 2003 Draft Standard Oct. 1996. |
Perkins, C., "IP Mobility Support", RFC 2002 Draft Standard, Oct. 1996. |
Perkins, C., et al., "Using DHCP With Computers That Move", Wireless Networks J., vol. 1. |
Perkins, C.E. et al.: :DHCP For Mobile Networking With TCP/IP, Proceedings IEEE International Symposium on Communications, Jun. 27, 1995, pp. 255-261, XP002132695. |
Vatn, J. et al., "The effect of Using co-located care-of address on macro handover latency", Proceedings of Nordic Teletraffic Seminar, Aug. 1998. |
Vatn, J., "Long random wait-times for getting a care-of address are a danger to Mobile Multimedia", IEEE Intl. Workshop on Mobile Multimedia Communciations, pp. 142-144, Nov. 1999. |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050021766A1 (en) * | 2001-03-26 | 2005-01-27 | Mckeowen Jean Christophe | Broadband communications |
US8015271B2 (en) * | 2001-03-26 | 2011-09-06 | Accenture Global Services Limited | Method and system of provisioning a desired communication service for a user across a network |
US20060002407A1 (en) * | 2004-07-01 | 2006-01-05 | Fujitsu Limited | Network system, network bridge device, network management apparatus, network address assignment method and network address resolution method |
US20080310375A1 (en) * | 2004-09-20 | 2008-12-18 | Matsushita Electric Industrial Co., Ltd. | Return Routability Optimisation |
US7933253B2 (en) * | 2004-09-20 | 2011-04-26 | Panasonic Corporation | Return routability optimisation |
US20070011045A1 (en) * | 2005-07-07 | 2007-01-11 | Munch Marketing Inc. | Method for advertising |
US20080159230A1 (en) * | 2007-01-03 | 2008-07-03 | Jae-Hun Cho | Bridge-based cellular ethernet system and handover processing method therefor |
US8923243B2 (en) * | 2007-01-03 | 2014-12-30 | Samsung Electronics Co. Ltd. | Bridge-based cellular ethernet system and handover processing method therefor |
US20100125899A1 (en) * | 2008-11-17 | 2010-05-20 | Qualcomm Incorporated | Remote access to local network via security gateway |
US20100124228A1 (en) * | 2008-11-17 | 2010-05-20 | Qualcomm Incorporated | Remote access to local network |
US9345065B2 (en) * | 2008-11-17 | 2016-05-17 | Qualcomm Incorporated | Remote access to local network |
US10142294B2 (en) | 2008-11-17 | 2018-11-27 | Qualcomm Incorporated | Remote access to local network |
US8996716B2 (en) | 2008-11-17 | 2015-03-31 | Qualcomm Incorporated | Remote access to local network via security gateway |
US20100180014A1 (en) * | 2009-01-14 | 2010-07-15 | International Business Machines Corporation | Providing network identity for virtual machines |
US8019837B2 (en) * | 2009-01-14 | 2011-09-13 | International Business Machines Corporation | Providing network identity for virtual machines |
US20100250787A1 (en) * | 2009-03-26 | 2010-09-30 | Brother Kogyo Kabushiki Kaisha | Information processing device, information processing system provided with the same, and computer readable medium for the same |
US8521913B2 (en) * | 2009-03-26 | 2013-08-27 | Brother Kogyo Kabushiki Kaisha | Information processing device, information processing system provided with the same, and computer readable medium for the same |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8102811B2 (en) | Providing mobility management protocol information to a mobile terminal for performing handover in a mobile communication system | |
CA2337704C (en) | Transient tunneling for dynamic home addressing on mobile hosts | |
US8090828B2 (en) | Method and apparatus for reusing DHCP addresses in home addresses of mobile IP clients | |
US7583635B2 (en) | Establishing network address of mobile terminal in mobile communication system | |
US6515974B1 (en) | Mobile computer communication scheme supporting moving among networks of different address systems | |
JP4071136B2 (en) | COMMUNICATION SYSTEM, CONNECTION DEVICE, AND COMMUNICATION METHOD | |
EP0938217B1 (en) | Mobile IP communication scheme using dynamic address allocation protocol | |
US8095130B2 (en) | Controlling hand-off in a mobile node with two mobile IP clients | |
US20030021275A1 (en) | Mobile data routing | |
US7461169B2 (en) | DHCP based home address management of mobile IP clients | |
EP1665714B1 (en) | Reachability maintainance of a moving network based on temporary name identifiers | |
EP1479211A2 (en) | Methods and apparatus for mobile ip home agent clustering | |
WO2002032159A2 (en) | Mobility management for mobile hosts | |
US7554967B1 (en) | Transient tunneling for dynamic home addressing on mobile hosts | |
CA2502063C (en) | Methods and apparatus for home address management at home agent for nai based mobile nodes | |
US20040218558A1 (en) | Dynamic IP address allocation | |
WO2005107178A1 (en) | A method and system for providing ipv6 service | |
EP2299748A1 (en) | Method and system for supporting mobility security in the next generation network | |
KR20020096256A (en) | Dynamic mobile address management apparatus and its method and wireless packet service method using them | |
KR100568474B1 (en) | Method and apparatus for providing improved mobile IP for efficient network configuration | |
KR100625926B1 (en) | Method and system for providing mobile IP of COA method with improved authentication function | |
KR100848456B1 (en) | Mobile address auto registration device and method in mobile internet network | |
Thuel et al. | Dynamic Configuration of Mobile Devices for Wireless Internet Access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY Free format text: MERGER;ASSIGNOR:LUCENT TECHNOLOGIES INC.;REEL/FRAME:022661/0823 Effective date: 20081101 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:ALCATEL-LUCENT USA INC.;REEL/FRAME:030510/0627 Effective date: 20130130 |
|
AS | Assignment |
Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:033950/0261 Effective date: 20140819 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: OMEGA CREDIT OPPORTUNITIES MASTER FUND, LP, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:043966/0574 Effective date: 20170822 Owner name: OMEGA CREDIT OPPORTUNITIES MASTER FUND, LP, NEW YO Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:043966/0574 Effective date: 20170822 |
|
AS | Assignment |
Owner name: WSOU INVESTMENTS, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALCATEL LUCENT;REEL/FRAME:044000/0053 Effective date: 20170722 |
|
AS | Assignment |
Owner name: BP FUNDING TRUST, SERIES SPL-VI, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:049235/0068 Effective date: 20190516 |
|
AS | Assignment |
Owner name: WSOU INVESTMENTS, LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:OCO OPPORTUNITIES MASTER FUND, L.P. (F/K/A OMEGA CREDIT OPPORTUNITIES MASTER FUND LP;REEL/FRAME:049246/0405 Effective date: 20190516 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: OT WSOU TERRIER HOLDINGS, LLC, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:056990/0081 Effective date: 20210528 |
|
AS | Assignment |
Owner name: WSOU INVESTMENTS, LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:TERRIER SSC, LLC;REEL/FRAME:056526/0093 Effective date: 20210528 |
|
FEPP | Fee payment procedure |
Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1556); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |